The Seven Laws of Mobile Enterprise Applications – LAW 1: MOBILE APPLICATIONS MUST BE PRESENCE AWARE

Unlike the simple, flat, tethered PC experience, mobile devices are always at your side and participate, actively or passively, in all your activities. They are always connected to the Internet, store vital details about you, including your schedule and personal network, and have surprising amounts of idle computing power. Mobile […]

2016-10-13T10:21:02-04:00December 20th, 2011|Blog|

2012 Security Predictions

According to Help Net Security, these are the influential security trends to watch in 2012. What do you think?

1. The human perimeter

Expectation: further examples of the socially engineered email attacks combined with zero day exploits as perpetrated against RSA and its client base, Operation Aurora and Google Gmail.

Prevention: Frequent staff training and […]

2018-07-20T13:41:36-04:00December 15th, 2011|Blog|

Cloud Security Checklist

In our survey of IT professionals, 61% of people said data security in the cloud is a shared responsibility between cloud provider and data owner. Another 37% said it’s completely the data owner’s responsibility to keep it secure. But how exactly do you ensure the security of […]

2020-10-16T13:03:01-04:00December 14th, 2011|Blog|

Where to start in your mobile strategy

More and more mobile devices make their entrance to companies: iPhones, iPads, Android phones etc etc.
 What to do with this fact as an IT manager? Where do you start and what are choices you have to make?

First, let’s start with a number of trends that you need […]

2016-10-13T10:21:05-04:00December 13th, 2011|Blog|
Go to Top